IT Questions and Answers :)

Tuesday, December 3, 2019

What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

  • Redyms
  • Kovter
  • OSX.Calisto
  • OSX.Imuler 
What popular form of Mac specific malware discovered in July 2018 will enable remote login, enable screen sharing, add permissions for malicious actors, add remote login capabilities for all users, and add its own user account to a Mac?

EXPLANATION

Discovered in the July of 2018 by Symantec, the OSX.Calisto Trojan remained undetected for at least two years. Apparently,
the backdoor was first uploaded to VIrusTotal in 2016. This malware can essentially provide malicious actors with full control over your Mac device and full access to the entirety of your data.

SOURCE

https://www.vipre.com/blog/mac-malware-cybersecurity/



Share:

Monday, December 2, 2019

DMARC builds on what other 2 industry standards to authenticate email?

DMARC builds on what other 2 industry standards to authenticate email?

  • DKIM and SPF
  • DKIM and SMTP
  • SPF and SMTP
  • DKIM and IMAP 
DMARC builds on what other 2 industry standards to authenticate email?

EXPLANATION

DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication, policy, and reporting protocol.
It builds on the widely deployed SPF and DKIM protocols, adding linkage to the author (“From:”) domain name, published policies for recipient handling of authentication failures, and reporting from receivers to senders, to improve and monitor protection of the domain from fraudulent email.

SOURCE

https://dmarc.org/
Share:

Wednesday, November 27, 2019

Excluding the host adapter, how many devices can be connected to a single narrow SCSI bus?

Excluding the host adapter, how many devices can be connected to a single narrow SCSI bus?

  • 8
  • 32
  • 7
  • 12 

EXPLANATION

Up to 8 devices can be attached to a single SCSI bus. One of these is the host adapter, leaving room for 7 'real' devices.

SOURCE

http://ask.microsemi.com/app/answers/detail/a_id/1971/~/how-many-scsi-devices-can-be-attached-on-a-scsi-controller%3F
Share:

Monday, November 25, 2019

What is a zero day vulnerability?

What is a zero day vulnerability?

  • A hole in software that is unknown to the vendor
  • A vulnerability exploited after it has been patched
  • An attack by a programmer on a vulnerability in their own code.
  • An attack on the very first day of a product's release


What is a zero day vulnerability?

EXPLANATION

A zero day vulnerability refers to a hole in software that is unknown to the vendor.
In a zero day attack, this security hole is exploited by hackers before the vendor becomes aware of the problem and patches it.

SOURCE

Share:

Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

  • Chef
  • Ansible
  • PepperStack
  • Puppet

 
Which of the following automation and configuration management platforms are agentless and use SSH or WinRM as connection/control mechanisms.

EXPLANATION

Additional links provided below:

  • Puppet and Chef use agents installed on the node to communicate with the server.
  • PepperStack is a fake name for SaltStack which is another agentless configuration management platform.
  • Ansible uses agentless communication through SSH to control devices ranging from Linux servers to Cisco switches. It uses WinRM to communicate with Windows clients and servers.
SSH
https://docs.ansible.com/ansible/latest/user_guide/intro_getting_started.html
WinRM
https://docs.ansible.com/ansible/latest/user_guide/windows_winrm.html?highlight=winrm
Network Automation
https://docs.ansible.com/ansible/latest/network/index.html

SOURCE

https://www.gspann.com/resources/blogs/puppet-vs-chef-vs-ansible
Share:

Popular Posts